Always duplicate the session on NewSessionTicket in TLSv1.3
authorMatt Caswell <matt@openssl.org>
Thu, 23 Mar 2017 11:22:26 +0000 (11:22 +0000)
committerMatt Caswell <matt@openssl.org>
Wed, 26 Apr 2017 15:42:29 +0000 (16:42 +0100)
commit150840b9443d371bfa26e2a33051aa137b5606fc
treec512f5e2451f1463b098296ebcfa7088f8d51e1a
parent6ff71494687cf9ed83ef20ea7d5f75b754c06525
Always duplicate the session on NewSessionTicket in TLSv1.3

Because NST messages arrive post-handshake, the session may have already
gone into the cache. Once in the cache a session must be immutable -
otherwise you could get multi-thread issues.

Reviewed-by: Rich Salz <rsalz@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/3008)
ssl/statem/statem_clnt.c